US7703078B2 - Apparatus, methods and articles of manufacture for software demonstration - Google Patents

Apparatus, methods and articles of manufacture for software demonstration Download PDF

Info

Publication number
US7703078B2
US7703078B2 US10/654,080 US65408003A US7703078B2 US 7703078 B2 US7703078 B2 US 7703078B2 US 65408003 A US65408003 A US 65408003A US 7703078 B2 US7703078 B2 US 7703078B2
Authority
US
United States
Prior art keywords
email
program
user
demonstrated
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US10/654,080
Other versions
US20050048448A1 (en
Inventor
Peter V. Radatti
Richard J. Perry
II Gary L. Blawat
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cybersoft Inc
Original Assignee
Cybersoft Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Assigned to CYBERSOFT, INC. reassignment CYBERSOFT, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: RADATTI, PETER V.
Assigned to CYBERSOFT, INC. reassignment CYBERSOFT, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BLAWAT, GARY L., II
Priority to US10/654,080 priority Critical patent/US7703078B2/en
Application filed by Cybersoft Inc filed Critical Cybersoft Inc
Assigned to CYBERSOFT, INC. reassignment CYBERSOFT, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PERRY, RICHARD J.
Publication of US20050048448A1 publication Critical patent/US20050048448A1/en
Publication of US7703078B2 publication Critical patent/US7703078B2/en
Application granted granted Critical
Assigned to CYBERSOFT IP LLC reassignment CYBERSOFT IP LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CYBERSOFT INC
Assigned to CYBERSOFT INC. reassignment CYBERSOFT INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CYBERSOFT IP LLC
Assigned to CYBERSOFT, INC. reassignment CYBERSOFT, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CYBERSOFT IP LLC
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B5/00Electrically-operated educational appliances
    • G09B5/06Electrically-operated educational appliances with both visual and audible presentation of the material to be studied

Abstract

Apparatus, methods and articles of manufacture for software demonstration are disclosed. Apparatus include a server that provides, via a network, a program or programs to be demonstrated to a user. The user uploads the code that the program will execute. Results are then supplied after execution, and may be made available to the user in a number of ways. Methods and articles of manufacture are also disclosed.

Description

FIELD OF THE INVENTION
The present invention relates to software demonstration. More specifically, the present invention relates to software demonstration through computer networks.
BACKGROUND OF THE INVENTION
Providing software for user demonstration may be difficult. For example, a stand alone software product may be demonstrated through physically delivering a trial copy to a user, or permitting download of a trial copy and subsequent installation on a user's machine, and there are few technical difficulties associated with such procedures. However, if the software is not standalone, and/or requires installation and integration with existing software, a demonstration cannot easily be installed and less easily removed from a user's system.
One example of software that needs integration into a user's system or network is email system software. Email system software usually requires installation on a server and configuration to accommodate the network and its users. Although demonstration copies can be provided on demonstration machines, the peculiarities of a user's system and/or network may make any such demonstration of such a software product less than convincing.
If the software is being offered as a service, such as might be done by an Application Service Provider (“ASP”) with an email scanning service, demonstration difficulties are multiplied. When email scanning software is offered as a service, a live demonstration requires resources—a sales person for example, with a properly configured machine. Similar to the difficulties noted above with regard to demonstrating a product, demonstrating a service on a machine or network other than a user's machine or network may simply be unconvincing.
Internet based demonstrations do eliminate at least one difficulty associated with software demonstration of either a service or product by making distribution of a trial product or service less costly than physical demonstration. However, Internet demonstrations of a software service that requires integration with a user's system or network, such as an email system, may be impossible because the Internet or file server offering the demonstration software service is not the user's. Thus, integration issues cannot be revealed in such a demonstration.
Certain methods have been developed to attempt to solve software service distribution difficulties. For example, a virus scanning service for email may let the user send his or her email to a server for virus scanning. This method often provides an open relay. In other words, email is sent to a server and the server scans the email and then forwards the email according to its address. The problem with this method is that open relay mail servers are insecure, for example, an email server may be used to distribute unsolicited bulk email (UBE); as a platform of attack for an email denial of service, etc. Difficulties may multiply—once a mail server is being used to distribute UBE or in another unauthorized fashion, the server may be blacklisted or isolated from other email servers through placement on a DNS blocked list, etc. Thus an open relay method may be unacceptable.
Another method is to allow potential customers to send email to the server which is then processed and returned to the sender. However, this method may also be unacceptable because a user may intercept email that is to be returned to the sender. For example, a malicious user could surreptitiously install a program on the demonstration server that allows the interception of email.
Accordingly, there exists a need for improved apparatus, methods and articles of manufacture for demonstrating software.
SUMMARY OF THE INVENTION
The present invention comprises apparatus, methods and articles of manufacture for software demonstration. Methods comprise providing an identified user with access, via a network, to a server comprising a program to be demonstrated; receiving code from the user that will be executed by the program; executing the code within the program to be demonstrated; and, providing any results of the execution. Thus the user and others can review the performance of the software to be demonstrated on data supplied by the user, without implicating the user's system. Moreover, embodiments are made available over the Internet. Apparatus and articles of manufacture are also disclosed.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 shows the use of a preferred embodiment.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
The present invention comprises apparatus, methods and articles of manufacture for software demonstration. Embodiments may provide demonstrations of programs upon user-supplied code (“code” as used herein generally includes text, data, and files, as well as binaries) in any number of ways desired, for example, a single product (e.g., an email scanner from a single vendor,) a comparison of products in the same market (e.g., email scanners from different vendors) products in different markets (e.g., email scanners and proscribed code scanners,) combinations of these, etc.
FIG. 1 shows a email antivirus scanner program 30 accessible to user 20 via server 10 over network a. In this and other preferred embodiments, network a is the Internet, and server 10 is generally available via the Internet.
User 20 obtains access to program 30 in various ways in various embodiments. Generally, the preferred embodiments provide limited secured access through user identification as is further described below. However, it should be noted that access may be provided, in other embodiments, according to any methods. For example, access may be provided without restriction to any user, predefined restrictions may be applied to users as desired, etc.
Limited secured access is controlled a number of ways in various preferred embodiments. Generally, in the preferred antivirus email embodiments, a unique, operational email address, generated manually and/or automatically, is used to both identify the user and provide a destination for the user's email to be tested for the demonstration, as will be explained further below. For example, in a preferred embodiment a user may fill out a registration form, and then be contacted by the demonstrator's operator, in order to be provided with an demonstration email address and password. As another example, a user may automatically be provided with a demonstration email address upon filling out a registration form. (In yet other embodiments, further identification may be required, e.g. credit cards, personal information, etc.) In especially preferred embodiments, the server will automatically create a user id. One method of doing so used in an especially preferred embodiment is to assign the user an id based upon the email address the user has used to submit the sample. That email address then becomes the user id.
Additionally, embodiments may attempt to simplify user email addressing, by, for example, allowing a user to provide her own email prefix, to be appended to a demonstrator provided email domain. Of course, in email and other embodiments, other identification methods can be used, such as an ID number, password, etc. Moreover, it should be noted, an identified user may be able to use an embodiment once or more than once, in a variety of ways, such as for a predetermined time, with a predetermined amount of data, etc.
Returning to FIG. 1, once user 20 obtains access to program 30, she uses the provided email address to send, forward or otherwise transmit the email to be scanned by the demonstrator. In the preferred embodiments, the email to be scanned is limited, e.g., by numbers, by size, by allowed attachments, etc.
Program 30 then demonstrates its attributes on the emails provided by the user e.g., by scanning for proscribed code. Program 30 returns the results to server 10, where it is displayed as a web page, accessible via any commonly available web browser.
The user then logs onto server 10 to retrieve the demonstration results. Results are presented as a web page, which may have been constructed in any number of ways as known in the art, e.g. Active Server Pages, PHP, Perl, HTML, XML, .jsp, etc. The results will, of course, vary with the program to be demonstrated. For example, an antivirus program will show the results of its scan on the user-provided emails, an antispam scanner will show its results, etc. Generally, the results of any particular program will be displayed in a web page using the reporting capabilities of that particular program. It may also be desired, however, to provide results in other formats, for example, standardized formats across programs to be demonstrated, via email to a user address, etc. and so results may be presented in a predetermined format as well.
Thus the user is able to view the efficacy of the demonstrated program. If desired, in certain embodiments, a link may then be provided to purchase the demonstrated program, if the user desires.
Data obtained from the demonstrations may be retained on an as-desired basis; for example, daily, weekly, as run, when server space becomes limited, etc. Data obtained from the demonstrations may also be used to refine demonstration programs, if desired.
Of course, various embodiments may use various operating systems and technologies. For example, servers may be used that run on Sun Solaris® Unix®, as well as other Unix® and Unix®-like platforms, including but not limited to Linux® and its variants, OS X, as well as other operating system platforms and code including but not limited to Microsoft Server 2003, Microsoft Windows® XP, Windows® NT, Windows® 2000, Windows® 95, 98 CE and Me, IBM OS/390, MacOS, VxWorks,® Palm OS, Symbian, Java and others. The demonstration system may be present in a different operating system than the user's machine, as all that may be necessary for the user is a web browser, in those web-based embodiments. Moreover, embodiments may be constructed in a number of ways, e.g., present on a single server, where the program to be demonstrated resides on that server, across a number of servers, machines, in a distributed fashion, etc.
Embodiments may be highly secured systems as well and use various security methods, both described herein and as known in the art, to secure access. Increased security may also be provided in various embodiments through other methods. For example, passwords may be used in various manners in order to attempt to increase security of the embodiment. For example, either or both providing data and receiving results may be subject to password protection, and that password protection may be used in a number of ways. For example, passwords may be required by the system in the headers or body of a forwarded message; to display of test results, etc.
Embodiments may also provide secure shut down mechanisms. So, for example, if an embodiment detects that it is under a denial of service attack via mail flood or any other method, from another node, system or systems on the network, it can configure itself and/or a network gateway to temporarily not accept connections from the node, system or systems that are doing the attack. The embodiment would then report the attack to a network administrator.
Embodiments may also remove user emails on a predetermined schedule. For example, any email addresses that are not assigned to an active user (one using the system for demonstration purposes) may be removed as soon as possible, on a regular schedule, etc. As another example, the server may be moved from domain to domain in order to minimize tampering. Email addresses may then be removed, be made unusable, etc.
Demonstrations may be of any programs desired and, in various embodiments, one or more programs may be made available for demonstration. In certain preferred embodiments, those products made available for demonstration may be from a single vendor. Yet other preferred embodiments may make products available from multiple vendors for demonstration, e.g., comparative testing offered by network and/or web-based retailers, reviewers, etc. Thus, the same user provided data may be used to test a number of programs, e.g. a user might desire to test competing antivirus programs, competing compilers, etc. and results from each program be provided accordingly. It should be noted that any number of programs may be demonstrated as desired, as well as upgrades, patches, maintenance fixes, etc.
As embodiments may be provided to demonstrate various types of software, embodiments may provide, to a server or servers containing the program or programs to be demonstrated, any type of user provided code. For example, a user may provide code specific to the demonstration and so may provide other types of code instead of, or in addition to, email. For example, user provided code may be transmitted in order to have a server demonstration of instant messaging code, peer-to-peer code, validity checker(s), syntax checker(s), etc.
Embodiments are available as desired. For example, because of their automated nature, an embodiment may be made available constantly over the Internet, and thus accessible to users.
The above description and the views and material depicted by the figures are for purposes of illustration only and are not intended to be, and should not be construed as, limitations on the invention. Moreover, certain modifications or alternatives may suggest themselves to those skilled in the art upon reading of this specification, all of which are intended to be within the spirit and scope of the present invention as defined in the attached claims.

Claims (20)

1. An apparatus for software demonstration comprising:
a server including a storage component and being configured with an antivirus scanner program to be demonstrated installed thereon in said storage component;
said server being accessible to an identified user identified by a unique email address that comprises a destination for email received by the user at a different address that is to be tested for the demonstration, said server being configured to receive code comprising email from said identified user machine, execute said received code comprising email with said antivirus scanner program to be demonstrated, and provide results of said execution based on the application of said antivirus scanner program to be demonstrated to said code comprising email, wherein said server and said antivirus scanner program to be demonstrated installed thereon are configured to manipulate said received code to provide a result, based on said received code that corresponds with the antivirus scanner program to be demonstrated to provide the results that would have been obtained if the antivirus scanner program were installed on the user machine from which the received code was obtained, wherein said apparatus further includes a network in which said code is received by said server from said identified user;
wherein said apparatus is configured to provide results of said demonstrated attributes of said program for displaying as a web page; and
wherein said apparatus is further configured to accent a log on from said identified user associated with said unique email address for retrieval of said demonstration results.
2. An apparatus as in claim 1 wherein said server is accessible to said identified user via the Internet.
3. An apparatus as in claim 1 wherein said server is configured to provide results of said execution via a web page.
4. An apparatus as in claim 1 wherein said apparatus is in distributed form.
5. An article of manufacture comprising at least one server having a communications link and having a storage component and being configured with an antivirus scanner program to be demonstrated installed thereon and being configured with a web site providing access to the antivirus scanner program to be demonstrated by identifying a user by a unique email address wherein said email address comprises a destination for email received by the user at a different address to be tested for the demonstration, whereby said antivirus scanner program to be demonstrated executes with said server code comprising email that is provided by an identified user identified by a unique email address that comprises a destination for email received by the user at a different address to be tested for the demonstration; and said web site further provides results of said execution; wherein said article is configured to provide results of said demonstrated attributes of said program for displaying as a web page; and wherein said apparatus is further configured to accept a log on from said identified user associated with said unique email address for retrieval of said demonstration results.
6. An article as in claim 5 wherein said website further provides results of said execution via a web page.
7. A method of performing software demonstration for demonstration of an antivirus scanner program on user supplied email comprising:
providing a server having a communications link and being configured with an antivirus scanner program;
providing an identified user with access, via a network, to the server comprising the antivirus scanner program to be demonstrated;
identifying the user by a unique email address;
wherein said email address comprises a destination for email received by the user at a different address to be tested for the demonstration;
communicating using said email address email for scanning by said antivirus scanner program to be demonstrated;
demonstrating attributes of said antivirus scanning program on said communicated email by scanning said email for proscribed code;
providing results of said demonstrated attributes of said program on said emails to a server and displaying said results as a web page;
accepting a log on to said server from said identified user associated with said unique email address for retrieval of said demonstration results.
8. A method as in claim 7 wherein said server is a highly secured server.
9. A method as in claim 7 wherein said providing an identified user with access, via a network, to the server comprising an antivirus program to be demonstrated further comprises providing said identified user with access, via the Internet.
10. A method as in claim 7, further comprising limiting the amount of email that may be communicated by said user for demonstration by said antivirus scanning program.
11. A method as in claim 7, wherein demonstrating attributes of said program further comprises demonstrating for a predetermined time.
12. A method as in claim 7, further comprising providing said identified user with an option to purchase said program.
13. A method as in claim 7, further comprising providing said server with a secure shut down mechanism, wherein said server shutdown mechanism is configured with an instruction to temporarily refuse acceptance of connections from a node, system or systems that are doing the attack.
14. A method as in claim 7, comprising at least two programs to be demonstrated wherein at least one program to be demonstrated comprises an antivirus scanner program; and wherein each of said programs to be demonstrated is executed on the same communicated email.
15. A method as in claim 7, wherein said web page accessible to one or more of said user and others.
16. The method of claim 7,
wherein said results provided comprise the results that would have been obtained if the antivirus scanner program were installed for operation on the user machine from which the received code comprising email was obtained.
17. The method of claim 16, wherein communicating email for scanning by said antivirus scanner program to be demonstrated is automatically configured to communicate said email for scanning by the antivirus program to be demonstrated, and wherein said server is automatically configured to demonstrate attributes of said antivirus scanning program on said communicated email by scanning said email for proscribed code and to provide the results of said demonstrated attributes of said program on said emails and to display said results as a web page.
18. The method of claim 7, wherein the demonstration comprises a plurality of programs that may be comparatively demonstrated.
19. The method of claim 18, wherein a plurality of demonstration programs are provided, and wherein a retailer of one or more of said plurality of demonstration programs provides comparative testing of a user's email for said plurality of demonstration programs.
20. The method of claim 7, wherein providing an identified user with access includes generating a unique operational email address for the user.
US10/654,080 2003-09-03 2003-09-03 Apparatus, methods and articles of manufacture for software demonstration Expired - Fee Related US7703078B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/654,080 US7703078B2 (en) 2003-09-03 2003-09-03 Apparatus, methods and articles of manufacture for software demonstration

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/654,080 US7703078B2 (en) 2003-09-03 2003-09-03 Apparatus, methods and articles of manufacture for software demonstration

Publications (2)

Publication Number Publication Date
US20050048448A1 US20050048448A1 (en) 2005-03-03
US7703078B2 true US7703078B2 (en) 2010-04-20

Family

ID=34218008

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/654,080 Expired - Fee Related US7703078B2 (en) 2003-09-03 2003-09-03 Apparatus, methods and articles of manufacture for software demonstration

Country Status (1)

Country Link
US (1) US7703078B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080071689A1 (en) * 2006-09-14 2008-03-20 Macrovision Corporation Method And System For Creating License Management In Software Applications
US20090024992A1 (en) * 2007-07-16 2009-01-22 Kulaga Andrey A System and method for administration of mobile application

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007109444A2 (en) * 2006-03-17 2007-09-27 Schmitt William C Common format learning device
US20130067578A1 (en) * 2011-09-08 2013-03-14 Mcafee, Inc. Malware Risk Scanner

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5600790A (en) * 1995-02-10 1997-02-04 Research In Motion Limited Method and system for loading and confirming correct operation of an application program in a target system
JPH1021173A (en) 1995-12-29 1998-01-23 Wyse Technol Inc Method and device for displaying application program with window in terminal
US5832208A (en) * 1996-09-05 1998-11-03 Cheyenne Software International Sales Corp. Anti-virus agent for use with databases and mail servers
WO2000004674A1 (en) * 1998-07-16 2000-01-27 Preview Systems, Inc. Referrer-based system for try/buy electronic software distribution
US6266774B1 (en) * 1998-12-08 2001-07-24 Mcafee.Com Corporation Method and system for securing, managing or optimizing a personal computer
US20010053982A1 (en) * 2000-05-24 2001-12-20 Shimadzu Corporation Method of selling measuring or analyzing apparatus
US6334214B1 (en) * 1998-04-03 2001-12-25 Preview Software Try/buy wrapping of installation-ready software for electronic distribution
US20020147780A1 (en) * 2001-04-09 2002-10-10 Liu James Y. Method and system for scanning electronic mail to detect and eliminate computer viruses using a group of email-scanning servers and a recipient's email gateway
JP2002342084A (en) * 2001-05-21 2002-11-29 Nec Soft Ltd Software demonstration environment providing system and software demonstration environment providing method
US6654888B1 (en) * 1999-12-31 2003-11-25 International Business Machines Corporation Installing and controlling trial software
US20040015965A1 (en) * 2001-06-02 2004-01-22 Malcom Sparks Installation-free middleware demonstration system
US6788769B1 (en) * 1999-10-13 2004-09-07 Emediacy, Inc. Internet directory system and method using telephone number based addressing
US6918038B1 (en) * 1996-08-13 2005-07-12 Angel Secure Networks, Inc. System and method for installing an auditable secure network
US6978232B1 (en) * 2000-06-30 2005-12-20 Interland, Inc. Method and system of demonstrating a service that provides computerized transactions using a computer network
US7113948B2 (en) * 2003-03-21 2006-09-26 Acellion Pte Ltd. Methods and systems for email attachment distribution and management
US7152164B1 (en) * 2000-12-06 2006-12-19 Pasi Into Loukas Network anti-virus system
US7281269B1 (en) * 2002-03-06 2007-10-09 Novell, Inc. Methods, data structures, and systems to remotely validate a message

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5600790A (en) * 1995-02-10 1997-02-04 Research In Motion Limited Method and system for loading and confirming correct operation of an application program in a target system
JPH1021173A (en) 1995-12-29 1998-01-23 Wyse Technol Inc Method and device for displaying application program with window in terminal
US5918039A (en) 1995-12-29 1999-06-29 Wyse Technology, Inc. Method and apparatus for display of windowing application programs on a terminal
US6918038B1 (en) * 1996-08-13 2005-07-12 Angel Secure Networks, Inc. System and method for installing an auditable secure network
US5832208A (en) * 1996-09-05 1998-11-03 Cheyenne Software International Sales Corp. Anti-virus agent for use with databases and mail servers
US6334214B1 (en) * 1998-04-03 2001-12-25 Preview Software Try/buy wrapping of installation-ready software for electronic distribution
WO2000004674A1 (en) * 1998-07-16 2000-01-27 Preview Systems, Inc. Referrer-based system for try/buy electronic software distribution
US6266774B1 (en) * 1998-12-08 2001-07-24 Mcafee.Com Corporation Method and system for securing, managing or optimizing a personal computer
US6788769B1 (en) * 1999-10-13 2004-09-07 Emediacy, Inc. Internet directory system and method using telephone number based addressing
US6654888B1 (en) * 1999-12-31 2003-11-25 International Business Machines Corporation Installing and controlling trial software
US6854061B2 (en) * 1999-12-31 2005-02-08 International Business Machines Corporation Installing and controlling trial software
US20010053982A1 (en) * 2000-05-24 2001-12-20 Shimadzu Corporation Method of selling measuring or analyzing apparatus
US6978232B1 (en) * 2000-06-30 2005-12-20 Interland, Inc. Method and system of demonstrating a service that provides computerized transactions using a computer network
US7152164B1 (en) * 2000-12-06 2006-12-19 Pasi Into Loukas Network anti-virus system
US20020147780A1 (en) * 2001-04-09 2002-10-10 Liu James Y. Method and system for scanning electronic mail to detect and eliminate computer viruses using a group of email-scanning servers and a recipient's email gateway
JP2002342084A (en) * 2001-05-21 2002-11-29 Nec Soft Ltd Software demonstration environment providing system and software demonstration environment providing method
US20040015965A1 (en) * 2001-06-02 2004-01-22 Malcom Sparks Installation-free middleware demonstration system
US7281269B1 (en) * 2002-03-06 2007-10-09 Novell, Inc. Methods, data structures, and systems to remotely validate a message
US7113948B2 (en) * 2003-03-21 2006-09-26 Acellion Pte Ltd. Methods and systems for email attachment distribution and management

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"Demonstration Environment Provision System of Software and Demnstration Environment Provison Method of Software" Suzuki. *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080071689A1 (en) * 2006-09-14 2008-03-20 Macrovision Corporation Method And System For Creating License Management In Software Applications
US8620817B2 (en) * 2006-09-14 2013-12-31 Flexera Software, Inc. Method and system for creating license management in software applications
US20090024992A1 (en) * 2007-07-16 2009-01-22 Kulaga Andrey A System and method for administration of mobile application
US8250540B2 (en) * 2007-07-16 2012-08-21 Kaspersky Lab Zao System and method for administration of mobile application

Also Published As

Publication number Publication date
US20050048448A1 (en) 2005-03-03

Similar Documents

Publication Publication Date Title
USRE45326E1 (en) Systems and methods for securing computers
US10757120B1 (en) Malicious network content detection
Stock et al. Didn't You Hear Me?-Towards More Successful Web Vulnerability Notifications.
US11563694B1 (en) Systems and methods for cloud-based application access to resources of local hosts by arbitrating access using local host agent applications
CN103493061B (en) For the method and apparatus tackling Malware
US7996902B1 (en) System and method for certifying that data received over a computer network has been checked for viruses
US8769671B2 (en) Online fraud solution
EP0954794A4 (en)
US7984500B1 (en) Detecting fraudulent activity by analysis of information requests
US9628513B2 (en) Electronic message manager system, method, and computer program product for scanning an electronic message for unwanted content and associated unwanted sites
US20090235178A1 (en) Method, system, and computer program for performing verification of a user
US8856931B2 (en) Network browser system, method, and computer program product for scanning data for unwanted content and associated unwanted sites
CN102957690B (en) Website security verification method and system
JP6032449B1 (en) Cyber attack email response training system
US7703078B2 (en) Apparatus, methods and articles of manufacture for software demonstration
US20090150448A1 (en) Method for identifying at least two similar webpages
EP1330082A2 (en) Computer network for providing services controlled by e-mail
CN113901482A (en) Vulnerability detection method and device
Axelsson et al. Visualizing Intrusions: Watching the Webserver
US20020099808A1 (en) Accessing services across network security mechanisms
CN111368231A (en) Method and device for testing heterogeneous redundant architecture website
Anderson How the Help Desk Can Support the Security Team
Sherif et al. Deployment of anti‐virus software: a case study
Winsor Solaris 8 Advanced System Administrator's Guide
Oles How to Handle Attachments

Legal Events

Date Code Title Description
AS Assignment

Owner name: CYBERSOFT, INC., PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BLAWAT, GARY L., II;REEL/FRAME:014479/0831

Effective date: 20030818

Owner name: CYBERSOFT, INC., PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PERRY, RICHARD J.;REEL/FRAME:014480/0109

Effective date: 20030813

Owner name: CYBERSOFT, INC., PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RADATTI, PETER V.;REEL/FRAME:014480/0129

Effective date: 20030813

Owner name: CYBERSOFT, INC.,PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BLAWAT, GARY L., II;REEL/FRAME:014479/0831

Effective date: 20030818

Owner name: CYBERSOFT, INC.,PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PERRY, RICHARD J.;REEL/FRAME:014480/0109

Effective date: 20030813

Owner name: CYBERSOFT, INC.,PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RADATTI, PETER V.;REEL/FRAME:014480/0129

Effective date: 20030813

FPAY Fee payment

Year of fee payment: 4

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.)

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.)

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20180420

AS Assignment

Owner name: CYBERSOFT IP LLC, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CYBERSOFT INC;REEL/FRAME:055283/0265

Effective date: 20210202

AS Assignment

Owner name: CYBERSOFT INC., PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CYBERSOFT IP LLC;REEL/FRAME:059704/0710

Effective date: 20220412

AS Assignment

Owner name: CYBERSOFT, INC., PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CYBERSOFT IP LLC;REEL/FRAME:065248/0216

Effective date: 20231013